Cryptography and the Issue of Internet Security High level encryption or cryptography is used in a number of applications ranging from those which impact national security to those which are more mundane. Essentially, cryptography is the methodology of encoding information so that one’s privacy is ensured. This is particularly important when it comes to transactions which occur over the Internet. The risk of individuals gaining access to personal information or information which is critical to a country or a nation over the Internet is a very real one. The practice of cryptography lessens the likelihood of this happening. Part A — Identification and Description of the Issue greater and greater percentage of the world population is gaining access to the Internet and incorporating that access into their daily lives.
More and more business transactions and personal transactions are occurring on the Internet. There is no questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential. In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP and cryptography. While the TCP/IP protocol was an initial first attempt at public key Security Data Network">data security and integrity, it is insufficient.
The Essay on Anti Virus Software Spyware Security Information
How Can Home Internet Security Be Achieved Both Efficiently And Effectively? A reasonable amount of home Internet security can be achieved in an efficiently and effectively. Out of 20 people surveyed, 15 stated a firewall as most important, 5 said anti-virus software. In my opinion, anti-virus software is the most important security measure followed by a firewall. This is because viral attacks ...
TCP/IP was not really designed as a security provision and is insufficient to meet the criteria which are necessary to ensure safe transactions (Computer Reseller News PG).
Part B — -Understanding of Information Technology Background of Issue Examples of the criteria which must be met to ensure the protection of information which is transmitted over the Internet include: 1. The authentication of users. 2. The economical provision of single-user login services. 3.
The provision of one security scheme which works both from within the user’s firewall and from outside that firewall. 4. The protection of the privacy and integrity of both real-time and store-and-forward applications such as e-mail. (Computer Reseller News PG).
Part C — Analysis of Impact of Issue The impacts of insecure data transmission over the Internet are massive in their potential impacts. Our world is making a very fast transition from one of television and radio to one of the information age.
We transmit and receive a massive amount of information through the Internet which by its very nature is insecure and wild and free. Some information we transmit and receive through the Internet is trivial, other is critical from either a personal, business or national perspective. Without some form of encryption this information could not only fall into the wrong hands but it could also be read and manipulated by those who intercepted it. This, according to the type of information, could be disastrous from either a personal, business, or national perspective.
It could be presumed that intellectual property which currently belongs to its Creator would be freely disseminated around the globe with no practical way to control who saw it or how they utilized it (anonymous, web).
Part D — Proposed Solutions There are two possible solutions to the security of data on the Internet. These are TCP/IP and Cryptography. TCP/IP sessions can be captured, however, by unauthorized personnel using devises such as IP packet sniffers (Computer Reseller News PG).
The Essay on Von Storch Information Computer Internet
Is Your Information Safe? He doesn't wear a stocking mask over his face, and he doesn't break a window to get into your house. He doesn't hold a gun to your head, nor does he ransack your personal possessions. Just the same he's a thief. Although this thief is one you " ll not only never see, but you may not even realize right away that he's robbed you. The thief is a computer hacker and he ' ...
Cryptography, on the other hand, provides a single technology which has the potential to address all of the above criteria to ensure safe Internet transactions. The software provided by Hewlett Packard, VerSecure, offers an excellent and economical solution to the problem of data security on the Internet (M 2 Press Wire PG).
It allows the user to send and receive domestic and international files of the most secure nature (M 2 Press Wire PG).
VerSecure offers the user the ability to send sensitive data such as financial transactions, medical and legal records and much more (M 2 Press Wire PG).
With the utilization of industry-standard protocols such as Secure Sockets Layer (SSL), Secure Electronic Transactions (SET), and Secure Multipart Internet Mail Encoding (S/MIME), a foundation is formed for encryption, message integrity verification, authentication, and digital signatures (Menefee PG).
Although information can still be intercepted it is more difficult to decipher when the message has been encrypted.
One other measure must be implemented, however, to make this a working system through which information can unhesitatingly be shared. With the utilization of “public-key cryptography”, a system which was actually invented in 1976, senders and receivers can exchange encrypted information and decrypt it while at the same time not requiring that the sender and receiver share passwords or other information which they would prefer to keep personal (Computer Reseller News PG).
This is accomplished by assigning each user both a private and a public key (Computer Reseller News PG).
While the public key is published so that all can access it and use it to send information to its owner, the private key is kept secret and used by the receiver to decrypt the information which was sent (Computer Reseller News PG).
The utilization of cryptography is superior to dependence on TCP/IP in that while information can still be intercepted by unauthorized personnel, it is less likely to be decrypted due to the elaborate cryptographic scheme. Unlike cryptography, TCP/IP messages are commonly intercepted using sniffer packets.
The Essay on Information Technology Computer Technique People
As u know, information technology is very hot nowadays. But I think some of you may still remember the days when computer is not so popular. At that time, u may feel computer and information technology is so far away from our lives if you were not a computer specialist, u would never have the chance to use a computer. Now those days has gone. Computer has become more and more popular and You can ...
Once intercepted they are immediately apparent in their content and no decryption is involved. Sources Cited Anonymous. Introduction to Cryptology. web 2002. Computer Reseller News. Cryptography Is The Key To Intranet Security Needs, Computer Reseller News, 30 Jun 1999.
M 2 Press Wire. Hewlett-Packard: HP to make electronic world safe for Internet business, M 2 Press WIRE, 2 Mar 2000. Menefee, Craig. US Encryption Policy Stagnating Says Pioneer Diffie, Newsbytes News Network, 10 Oct 2001.